Is it really compatible iphone3gs ver.4.1 to ios 6.1.3

i cant use my phone now because i upgrade it to ios 6.1.3 and it shows that it is not compatible.how can i put it back ?

You can't downgrade that is not supported by Apple.  when you say it is not compatible what is happening?

Similar Messages

  • Is this power adapter (12W) really compatible with iPod shuffle?

    Hello,
    I'm just wondering if the 12W power adapter is really compatible with the iPod shuffle 4th generation.
    (http://store.apple.com/us/product/MD836LL/A/apple-12w-usb-power-adapter?fnode=74)
    It says it is compatible, but it doesn't make sense to me. Because iPod shuffle is so tiny, I fear that it would burn out if I plug it into a 12W. I understand that the 5W version is compatible but 12W seems interesting.
    What do you think? Do you use 12W for the iPod shuffle, too?

    It works fine and will not damage the Shuffle. The Shuffle will draw only the power it requires.

  • Why I get the message firmware file is not compatible when I try to update iOS 5.1 to 5.1.1 using iPad3,2_5.1.1_9B206_Restore.ipsw ?

    I get the message ''iPad could not be updated because the firmware file is not compatible" when I try to update iOS 5.1 to 5.1.1 using  the downloaded  iPad3,2_5.1.1_9B206_Restore.ipsw file.

    Thanks. But I have no access to Wi-fi & internet connection is very slow here.Then what can I do?
    Please help....

  • XCelsius 2008 is not backward compatible with ver 4.5

    Post Author: Joseph
    CA Forum: Xcelsius and Live Office
    I tried opening a project that was done with ver 4.5 but it just said that "Crystal Xcelsius is unable to load this file. This file may be corrupt or may have features that cannot be supported by this version of Crystal Xcelsius." So i guess I probably have to recreate the project in the 2008 version to take advantage of the new features available. So I imported the excel datasheet used in the old project to a new project in Xcelsius 2008 and tried recreating the objects from scratch. I had started with an accordion menu and two list boxes and then I decided to export to swf to test. However, the result was disappointing. I could only see the two list boxes but not the accordion menu. There was a message saying "Initializing..." that stayed. Does this mean I have to recreate the excel data from scratch as well?

    Post Author: abrat
    CA Forum: Xcelsius and Live Office
    X2008 is backward compatible with CX4.5.  But Jim is correct. There is a bug in X2008 which prevents it from opening some 4.5 models by double-clicking on the filename.  They can be opened from the File > Open menu.  This only affects opening the model.Due to the many changes between CX4.5 and X2008, the migration of old CX4.5 models is not clean.  Differences will be seen.  Most are cosmetic affecting only the look of the model.  But some tidy up, color changes and re-alignment work must be done.   There was no way to gain the benefits of X2008 and still keep CX4.5 models unchanged.Andy  

  • Is "pages" app really compatible to word .doc files?

    i tried opening word files with the pages yet it said that it was not compatible. i then had to open the file with another app in other to see it. i made a new file with pages and sent it via my email. i was not able to open it with the microsoft documents yet the description of the app said that it was compatible. How is this?

    What version of Pages?
    What version of Word?
    What was the file format?
    You didn't send a .pages file to the PC?
    PCs do not have Pages and can not open .pages files. You need to Export to Word .doc instead.
    Peter

  • Firefox not remembering passwords etc. fix not compatible with ver. 34.05. So what to do?

    Was pleased to find a fix for making my computer remember passwords, but NOT pleased to find that it is not compatible with my FF 34.05! How do I fix this or even go back to a previous version? Noticed that on some sites, the Password Remembering KEY does not show, particularly on Banking sites, so no option to save anyhow!

    What fix are you talking about?
    Current Firefox versions should offer to remember passwords regardless of the presence of autocomplete=off.
    Firefox won't offer to remember a password when you are in Private Browsing mode.
    Did you make sure that there aren't any exceptions?
    You can inspect and manage permissions for the domain in the currently selected tab via these steps:
    *Click the "[[Site Identity Button|Site Identity Button]]" (globe/padlock) on the location/address bar
    *Click "More Information" to open "Tools > Page Info" with the Security tab selected
    *Go to the Permissions tab (Tools > Page Info > Permissions) to check the permissions for the domain in the currently selected tab

  • Is Drobo REALLY compatible with Lion?

    I have a 2nd Gen Drobo (4 Bays with Firewire plug).  Ever since upgrading to Lion I have had numerous issues.  Super Duper (which was always very dependable) is not backing properly and my computer actually gets frozen quite often.  I can usually unfreeze it by unplugging the Drobo.  The Drobo website says that it is compatible with Lion and the Drobo Dashboard says that the Firmware is up to date and the drive is healthy, yet I still have problems.  My Lion install was a clean install.
    Am I alone on this?

    My Drobo FS is performing no differently under Lion than it did under Snow Leopard. In other words, it's stable but slow as molasses.
    Because the FS is a networked drive, though, I'm able to mount it on my desktop through Finder's "Connect to Server" option rather than rely on Drobo Dashboard. I suspect that's what's causing you trouble — on my computers, Drobo Dashboard has never been a stable piece of software.
    Hope you're able to figure it out.

  • The one website will not load because it is only compatible with ver 6 and 7. How do I downgrade to ver 6 or 7?

    The website is for invoicing and the very large company that has their invoicing on there is not going to upgrade to fix the problem, they say just download a previous version in order to access the site. However, I cannot find on here where to download a previous version of firefox.

    The only previous version that is still supported with security updates is Firefox 3.6.x.
    All other versions from Firefox 4 till the current Firefox 9.0.1 version are security and stability updates and add new features. It is not recommended to downgrade to such a version.
    You can install the portable Firefox 3.6.x version to access websites that do not work with Firefox 5+.
    *http://portableapps.com/apps/internet/firefox_portable#legacy
    *http://portableapps.com/apps/internet/firefox_portable/localization#legacy36
    See also:
    *https://support.mozilla.org/kb/Installing+a+previous+version+of+Firefox

  • The iphone could not be updated because the firmware file is not compatible, can i get back to ios 7 as iphone 5s or itsnot possible!!!

    My iphone 5s and model A1457 and even after i downloaded the IOS 7.1,2 itunes get me error "the iphone could not be updated because the firmware file is not compatible"
    some people saying that u cant get back and other saying yes u can
    i wonder if i still can and how to avoid that error
    IOS 8 Drain battery like **** -.-" & wireless not working well -.-", that's so annoying ...
    (if someone got a solution, i would appreciate it, Thx in advance)

    You may have to arrange to take the product into an authorized
    service agent for the iPhone (or other affected iDevice) to see
    if they can apply the correct firmware update, to help resolve the
    issue of upgrade; or if they have a way to put it as it was prior to
    the attempted upgrade to a later iOS.
    See all worldwide telephone support numbers
    Contact a mobile carrier
    Find an Apple Authorized Service Provider
    Visit an Apple Retail Store
    Pending some release of another update to the iOS, you'd need
    to have someone's hands-on effort to correct the issues your
    product faces now, before another round of upgrade attempt.
    Sorry that I have no exact method to attempt to resolve your issue.
    Good luck & happy computing!

  • HT4623 I dont have software updates in my device...iphone3g mean i dont have IOS...isnt it...i cant update without software updates

    need to have software update in my device..iphone3gs...how can i install to my phone and i cant update my phone without software update?

    Updating iOS

  • IP-sec site-to-site problem ASA ver 9.1 vs IOS

    Hi all,
    I'm trying to set up site-to-site vpn between ASA and IOS router, but unsuccessful,
    logs are :
    1) this end is not behind a nat device
    2) Received encrypted packet with no matching SA
    the networks are:
    172.25.0.0 (inside of ASA) A.A.A.A (outside of ASA) is needed to connect to IOS Router B.B.B.B address with 192.168.1.0 inside network
    Below are configs:
    ASA:
    ASA-5505# sh run
    : Saved
    ASA Version 9.0(1)
    hostname ASA-5505
    domain-name 1.kz
    names
    ip local pool vpn_pool_ASA-5505 192.168.172.2-192.168.172.100 mask 255.255.255.0
    ip local pool SAME_NET_ALA 172.25.66.200-172.25.66.210 mask 255.255.255.0
    interface Ethernet0/0
     switchport access vlan 2
     speed 10
    interface Ethernet0/1
    interface Ethernet0/2
    interface Ethernet0/3
    interface Ethernet0/4
    interface Ethernet0/5
    interface Ethernet0/6
    interface Ethernet0/7
    interface Vlan1
     nameif inside
     security-level 100
     ip address 172.25.66.15 255.255.255.0
    interface Vlan2
     nameif outside
     security-level 0
     ip address A.A.A.A 255.255.255.252
    ftp mode passive
    clock timezone ALMST 6
    clock summer-time ALMDT recurring last Sun Mar 0:00 last Sun Oct 0:00
    dns server-group DefaultDNS
     domain-name 1.kz
    same-security-traffic permit inter-interface
    same-security-traffic permit intra-interface
    object network obj_any
     subnet 0.0.0.0 0.0.0.0
    object network NETWORK_OBJ_172.25.66.0_24
     subnet 172.25.66.0 255.255.255.0
    object network NETWORK_OBJ_192.168.172.0_25
     subnet 192.168.172.0 255.255.255.128
    object network NETWORK_OBJ_172.25.66.192_27
     subnet 172.25.66.192 255.255.255.224
    object network ALA_office
     subnet 192.168.1.0 255.255.255.0
    object network NETWORK_OBJ_172.25.0.0_16
     subnet 172.25.0.0 255.255.0.0
    access-list SAME_NET_ALA_splitTunnelAcl standard permit 172.25.66.0 255.255.255.0
    access-list SAME_NET_ALA_splitTunnelAcl standard permit 10.0.0.0 255.0.0.0
    access-list SAME_NET_ALA_splitTunnelAcl standard permit 172.0.0.0 255.0.0.0
    access-list VPN-OUT-INS extended permit ip 192.168.172.0 255.255.255.0 any log
    access-list VPN-IN-INS extended permit ip any any log
    access-list VPN-OUT-OUT extended permit ip any 192.168.172.0 255.255.255.0 log
    access-list VPN-OUT-ALL standard permit any4
    access-list net172 standard permit 172.25.0.0 255.255.0.0
    access-list net10 standard permit 10.0.0.0 255.0.0.0
    access-list outside_cryptomap extended permit ip object NETWORK_OBJ_172.25.66.0_24 object ALA_office
    pager lines 24
    logging enable
    logging asdm informational
    mtu inside 1500
    mtu outside 1500
    no failover
    icmp unreachable rate-limit 1 burst-size 1
    icmp permit any inside
    no asdm history enable
    arp timeout 14400
    no arp permit-nonconnected
    nat (inside,outside) source static NETWORK_OBJ_172.25.66.0_24 NETWORK_OBJ_172.25.66.0_24 destination static NETWORK_OBJ_192.168.172.0_25 NETWORK_OBJ_192.168.172.0_25 no-proxy-arp route-lookup
    nat (inside,outside) source static obj_any obj_any destination static NETWORK_OBJ_172.25.66.192_27 NETWORK_OBJ_172.25.66.192_27 no-proxy-arp route-lookup
    nat (inside,outside) source static NETWORK_OBJ_172.25.66.0_24 NETWORK_OBJ_172.25.66.0_24 destination static ALA_office ALA_office no-proxy-arp route-lookup
    object network obj_any
     nat (inside,outside) dynamic interface
    nat (inside,outside) after-auto source dynamic any interface
    access-group VPN-IN-INS in interface inside
    access-group VPN-IN-INS out interface inside
    route outside 0.0.0.0 0.0.0.0 88.204.136.165 1
    route inside 10.0.0.0 255.0.0.0 172.25.66.1 2
    route inside 172.0.0.0 255.0.0.0 172.25.66.1 1
    timeout xlate 3:00:00
    timeout pat-xlate 0:00:30
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    timeout floating-conn 0:00:00
    dynamic-access-policy-record DfltAccessPolicy
    user-identity default-domain LOCAL
    aaa authentication ssh console LOCAL
    http server enable
    http 192.168.1.0 255.255.255.0 inside
    http 172.25.66.16 255.255.255.255 inside
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
    crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac
    crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set Alma-set esp-aes esp-sha-hmac
    crypto ipsec ikev2 ipsec-proposal DES
     protocol esp encryption des
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal 3DES
     protocol esp encryption 3des
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES
     protocol esp encryption aes
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES192
     protocol esp encryption aes-192
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES256
     protocol esp encryption aes-256
     protocol esp integrity sha-1 md5
    crypto ipsec security-association pmtu-aging infinite
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
    crypto map outside_map 1 match address outside_cryptomap
    crypto map outside_map 1 set peer B.B.B.B
    crypto map outside_map 1 set ikev1 transform-set Alma-set
    crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map outside_map interface outside
    crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map inside_map interface inside
    crypto ca trustpool policy
    crypto ikev2 policy 1
     encryption aes-256
     integrity sha
     group 5 2
     prf sha
     lifetime seconds 86400
    crypto ikev2 policy 10
     encryption aes-192
     integrity sha
     group 5 2
     prf sha
     lifetime seconds 86400
    crypto ikev2 policy 20
     encryption aes
     integrity sha
     group 5 2
     prf sha
     lifetime seconds 86400
    crypto ikev2 policy 30
     encryption 3des
     integrity sha
     group 5 2
     prf sha
     lifetime seconds 86400
    crypto ikev2 policy 40
     encryption des
     integrity sha
     group 5 2
     prf sha
     lifetime seconds 86400
    crypto ikev2 enable outside
    crypto ikev1 enable outside
    crypto ikev1 policy 1
     authentication pre-share
     encryption 3des
     hash md5
     group 2
     lifetime 86400
    crypto ikev1 policy 5
     authentication pre-share
     encryption aes
     hash sha
     group 2
     lifetime 86400
    crypto ikev1 policy 10
     authentication crack
     encryption aes-256
     hash sha
     group 2
     lifetime 86400
    crypto ikev1 policy 20
     authentication rsa-sig
     encryption aes-256
     hash sha
     group 2
     lifetime 86400
    crypto ikev1 policy 30
     authentication pre-share
     encryption aes-256
     hash sha
     group 2
     lifetime 86400
    crypto ikev1 policy 40
     authentication crack
     encryption aes-192
     hash sha
     group 2
     lifetime 86400
    crypto ikev1 policy 50
     authentication rsa-sig
     encryption aes-192
     hash sha
     group 2
     lifetime 86400
    crypto ikev1 policy 60
     authentication pre-share
     encryption aes-192
     hash sha
     group 2
     lifetime 86400
    crypto ikev1 policy 70
     authentication crack
     encryption aes
     hash sha
     group 2
     lifetime 86400
    crypto ikev1 policy 80
     authentication rsa-sig
     encryption aes
     hash sha
     group 2
     lifetime 86400
    crypto ikev1 policy 100
     authentication crack
     encryption 3des
     hash sha
     group 2
     lifetime 86400
    crypto ikev1 policy 110
     authentication rsa-sig
     encryption 3des
     hash sha
     group 2
     lifetime 86400
    crypto ikev1 policy 120
     authentication pre-share
     encryption 3des
     hash sha
     group 2
     lifetime 86400
    crypto ikev1 policy 130
     authentication crack
     encryption des
     hash sha
     group 2
     lifetime 86400
    crypto ikev1 policy 140
     authentication rsa-sig
     encryption des
     hash sha
     group 2
     lifetime 86400
    crypto ikev1 policy 150
     authentication pre-share
     encryption des
     hash sha
     group 2
     lifetime 86400
    telnet timeout 5
    ssh 0.0.0.0 0.0.0.0 inside
    ssh 0.0.0.0 0.0.0.0 outside
    ssh timeout 5
    console timeout 0
    dhcpd auto_config outside
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    webvpn
     enable outside
     no anyconnect-essentials
    group-policy web_access internal
    group-policy web_access attributes
     vpn-tunnel-protocol ssl-clientless
     webvpn
      url-list value PRTG
    group-policy SAME_NET_ALA internal
    group-policy SAME_NET_ALA attributes
     dns-server value 8.8.8.8
     vpn-tunnel-protocol ikev1
     split-tunnel-policy tunnelspecified
     split-tunnel-network-list value SAME_NET_ALA_splitTunnelAcl
    group-policy GroupPolicy1 internal
    group-policy GroupPolicy1 attributes
     vpn-tunnel-protocol ikev1
    group-policy GroupPolicy_to_ALA internal
    tunnel-group SAME_NET_ALA type remote-access
    tunnel-group SAME_NET_ALA general-attributes
     address-pool SAME_NET_ALA
     default-group-policy SAME_NET_ALA
    tunnel-group SAME_NET_ALA ipsec-attributes
     ikev1 pre-shared-key *****
    tunnel-group web_access type remote-access
    tunnel-group web_access general-attributes
     default-group-policy web_access
    tunnel-group B.B.B.B type ipsec-l2l
    tunnel-group B.B.B.B general-attributes
     default-group-policy GroupPolicy1
    tunnel-group B.B.B.B ipsec-attributes
     ikev1 pre-shared-key *****
    class-map inspection_default
     match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
     parameters
      message-length maximum client auto
      message-length maximum 512
    policy-map global_policy
     class inspection_default
      inspect dns preset_dns_map
      inspect ftp
      inspect h323 h225
      inspect h323 ras
      inspect ip-options
      inspect netbios
      inspect rsh
      inspect rtsp
      inspect skinny
      inspect esmtp
      inspect sqlnet
      inspect sunrpc
      inspect tftp
      inspect sip
      inspect xdmcp
      inspect icmp
      inspect http
    prompt hostname context
    no call-home reporting anonymous
    Cryptochecksum:932099620805dc22d9e48a5e04314887
    : end
    and IOS Router:
    R1921_center#sh run
    Building configuration...
    Current configuration : 6881 bytes
    ! Last configuration change at 12:22:45 UTC Fri Aug 29 2014 by yerzhan
    version 15.2
    service timestamps debug datetime msec
    service timestamps log datetime msec
    no service password-encryption
    hostname R1921_center
    boot-start-marker
    boot-end-marker
    logging buffered 51200 warnings
    aaa new-model
    aaa authentication login userauthen local
    aaa authorization network groupauthor local
    aaa session-id common
    ip cef
    ip domain name yourdomain.com
    no ipv6 cef
    multilink bundle-name authenticated
    crypto pki trustpoint TP-self-signed-260502430
     enrollment selfsigned
     subject-name cn=IOS-Self-Signed-Certificate-260502430
     revocation-check none
     rsakeypair TP-self-signed-260502430
    crypto pki certificate chain TP-self-signed-260502430
     certificate self-signed 01
      30820229 30820192 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
      30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
      69666963 6174652D 32363035 30323433 30301E17 0D313331 31323630 35343131
      355A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
      532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3236 30353032
      34333030 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
      C178A16C 26637A32 E2FE6EB2 DE63FC5D 2F4096D2 1A223CAF 52A122A1 F152F0E0
      D2305008 FA312D36 E055D09C 730111B6 487A01D5 629F8DE4 42FF0444 4B3B107A
      F6439BA2 970EFE71 C9127F72 F93603E0 11B3F622 73DB1D7C 1889D57C 88C3B141
      ED39B0EA 377CE1F7 610F9C76 FC9C843F A81AEFFE 07917A4B 2946032B 207160B9
      02030100 01A35330 51300F06 03551D13 0101FF04 05300301 01FF301F 0603551D
      23041830 1680146B B9F671FA BDD822DF 76802EEA 161D18D6 9B8C4030 1D060355
      1D0E0416 04146BB9 F671FABD D822DF76 802EEA16 1D18D69B 8C40300D 06092A86
      4886F70D 01010505 00038181 00B0C56F F1F4F85C 5FE7BF24 27D1DF41 7E9BB9CE
      0447910A 07209827 E780FA0D 3A969CD0 12929830 14AAA496 0D17F684 7F841261
      56365D9C AA15019C ABC74D0A 3CD4E002 F63AA181 B3CC4461 4E56E58D C8237899
      29F48CFA 67C4B84B 95D456C3 F0CF858D 43C758C3 C285FEF1 C002E2C5 DCFB9A8A
      6A1DF7E3 EE675EAF 7A608FB7 88
            quit
    license udi pid CISCO1921/K9 sn FCZ1748C14U
    redundancy
    crypto isakmp policy 1
     encr 3des
     hash md5
     authentication pre-share
     group 2
    crypto isakmp policy 3
     encr 3des
     authentication pre-share
     group 2
    crypto isakmp policy 5
     encr aes 256
     authentication pre-share
     group 2
    crypto isakmp key PSK-KEY address A.A.A.A
    crypto isakmp key 6 PSK-KEY address 0.0.0.0
    crypto isakmp client configuration group ALA-EMP-VPN
     key *.*.*.*
     dns 8.8.8.8
     domain cisco.com
     pool ippool
     acl 101
     netmask 255.255.255.0
    crypto ipsec transform-set dmvpn_alad esp-3des esp-md5-hmac
     mode transport
    crypto ipsec transform-set myset esp-3des esp-md5-hmac
     mode tunnel
    crypto ipsec transform-set TRIPSECMAX esp-3des esp-md5-hmac
     mode transport
    crypto ipsec transform-set AES-SHA esp-aes esp-sha-hmac
     mode tunnel
    crypto ipsec profile MAXPROFILE
     set transform-set TRIPSECMAX
    crypto ipsec profile dmvpn_profile
     set transform-set dmvpn_alad
    crypto dynamic-map dynmap 10
     set transform-set myset
     reverse-route
    crypto map clientmap client authentication list userauthen
    crypto map clientmap isakmp authorization list groupauthor
    crypto map clientmap client configuration address respond
    crypto map clientmap 20 ipsec-isakmp
     set peer A.A.A.A
     set transform-set AES-SHA
     match address VPN_ASA_PAV
    interface Loopback1
     ip address 10.10.10.10 255.255.255.255
    interface Tunnel2
     ip address 192.168.101.1 255.255.255.240
     no ip redirects
     ip nhrp authentication NHRPMAX
     ip nhrp map multicast dynamic
     ip nhrp network-id 4679
     ip ospf network broadcast
     ip ospf hello-interval 30
     ip ospf priority 10
     tunnel source GigabitEthernet0/1
     tunnel mode gre multipoint
     tunnel key 4679
    interface Embedded-Service-Engine0/0
     no ip address
     shutdown
    interface GigabitEthernet0/0
     description to_LAN
     ip address 192.168.1.253 255.255.255.0
     ip nat inside
     ip virtual-reassembly in
     duplex auto
     speed auto
    interface GigabitEthernet0/1
     description to_ISP
     ip address B.B.B.B 255.255.255.252
     ip nat outside
     ip virtual-reassembly in
     duplex auto
     speed auto
     crypto map clientmap
    router ospf 100
     auto-cost reference-bandwidth 1000
     area 0 authentication message-digest
     area 192.168.1.0 authentication message-digest
     redistribute static subnets
     passive-interface default
     no passive-interface Tunnel1
     network 10.10.10.10 0.0.0.0 area 192.168.1.0
     network 192.168.1.0 0.0.0.255 area 192.168.1.0
     network 192.168.222.0 0.0.0.15 area 0
    router ospf 1
     router-id 1.1.1.1
     redistribute static subnets
     passive-interface default
     no passive-interface Tunnel2
     network 10.10.10.10 0.0.0.0 area 192.168.1.0
     network 192.168.1.0 0.0.0.255 area 192.168.1.0
     network 192.168.101.0 0.0.0.15 area 0
    ip local pool ippool 192.168.33.1 192.168.33.20
    ip forward-protocol nd
    ip http server
    ip http access-class 23
    ip http authentication local
    ip http secure-server
    ip http timeout-policy idle 60 life 86400 requests 10000
    ip nat inside source list 111 interface GigabitEthernet0/1 overload
    ip nat inside source static tcp 192.168.1.11 22 B.B.B.B 8022 extendable
    ip route 0.0.0.0 0.0.0.0 B.B.B.C
    ip access-list extended ACL-NAT
     deny   ip 192.168.1.0 0.0.0.255 172.25.0.0 0.0.255.255
     permit ip any any
    ip access-list extended ACL-VPN
     permit ip 192.168.1.0 0.0.0.255 172.25.0.0 0.0.255.255
    ip access-list extended VPN_ASA_PAV
     permit ip 192.168.1.0 0.0.0.255 172.25.66.0 0.0.0.255
    access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.33.0 0.0.0.255
    access-list 111 deny   ip 192.168.1.0 0.0.0.255 192.168.33.0 0.0.0.255
    access-list 111 permit ip any any
    control-plane
    line con 0
    line aux 0
    line 2
     no activation-character
     no exec
     transport preferred none
     transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
     stopbits 1
    line vty 0 4
     exec-timeout 0 0
     privilege level 15
     transport input telnet ssh
    line vty 5 15
     exec-timeout 0 0
     privilege level 15
     transport input telnet ssh
    scheduler allocate 20000 1000
    end

    Dear Richard,
    they are mirrorly matches from both sides.
    ASA:
    access-list outside_cryptomap extended permit ip object NETWORK_OBJ_172.25.66.0_24 object ALA_office
    object network NETWORK_OBJ_172.25.66.0_24
     subnet 172.25.66.0 255.255.255.0
    object network ALA_office
     subnet 192.168.1.0 255.255.255.0
    IOS:
    ip access-list extended VPN_ASA_PAV
     permit ip 192.168.1.0 0.0.0.255 172.25.66.0 0.0.0.255

  • Can you recommend any games compatible with i phone 3 running IOS 4.2.1 suitable for young kids?

    Just trying to set up an old i phone 3 with some games and struggling to find some that will run on IOS 4.2.1 that are suitable for younger kids.  Any recommendations?

    Considering the age of the phone and the fact that app developers have been discontinuing support for most iOS lower than iOS 5.0, it could be very difficult. I just want to warn you of that as you wait for some answers here. I don't have children that play with a separate device anymore. Both of mine are college age and have their own iPhones, so their taste in games would probably not meet yours!

  • Really Slow web surfing through ZBF with IOS Content filter

    Edited: attached partial output of "sh policy-map type inspect zone-pair urlfilter"   
    Hey, all
    We have a 1921 router with IOS Content filter subscribsion and it is also configured as ZBF running latest IOS v15.1. End-user keep complaining about slow web surfing. I connected to network and tested myself and found intermittent surfing experience.
    For example, access to www.ibm.com or www.cnn.com hangs 7 times of 10 attempts and maybe only loads reasonablly quick in 1-2 time of the 3. This also affects the speed of download from websites.
    I have the case openned with Cisco TAC and CCIE checked my configure but nothing caught his eyes...
    I decide to post the issue here in case we both missed something:
    Current configuration : 18977 bytes
    version 15.1
    service timestamps debug datetime msec
    service timestamps log datetime msec
    no service password-encryption
    hostname abc_1921
    boot-start-marker
    boot system flash:/c1900-universalk9-mz.SPA.151-4.M4.bin
    boot-end-marker
    aaa new-model
    aaa authentication login default local
    aaa authentication login NONE_LOGIN none
    aaa authorization exec default local
    aaa session-id common
    clock timezone AST -4 0
    clock summer-time ADT recurring 3 Sun Mar 2:00 2 Sun Nov 2:00
    no ipv6 cef
    ip source-route
    ip auth-proxy max-login-attempts 5
    ip admission max-login-attempts 5
    ip cef
    ip dhcp excluded-address 192.168.1.1 192.168.1.9
    ip dhcp excluded-address 192.168.1.111 192.168.1.254
    ip dhcp pool DHCPPOOL
    import all
    network 192.168.1.0 255.255.255.0
    domain-name abc.local
    dns-server 192.168.10.200 192.168.10.202
    netbios-name-server 4.2.2.4
    default-router 192.168.1.150
    option 202 ip 192.168.1.218
    lease 8
    ip domain name abc.locol
    ip name-server 8.8.8.8
    ip name-server 4.2.2.2
    ip port-map user-port-1 port tcp 5080
    ip port-map user-port-2 port tcp 3389
    ip inspect log drop-pkt
    multilink bundle-name authenticated
    parameter-map type inspect global
    log dropped-packets enable
    parameter-map type urlfpolicy trend cprepdenyregex0
    allow-mode on
    block-page message "The website you have accessed is blocked as per corporate policy"
    parameter-map type urlf-glob cpaddbnwlocparapermit2
    pattern www.alc.ca
    pattern www.espn.com
    pattern www.bestcarriers.com
    pattern www.gulfpacificseafood.com
    pattern www.lafermeblackriver.ca
    pattern 69.156.240.29
    pattern www.tyson.com
    pattern www.citybrewery.com
    pattern www.canadianbusinessdirectory.ca
    pattern www.homedepot.ca
    pattern ai.fmcsa.dot.gov
    pattern www.mtq.gouv.qc.ca
    pattern licenseinfo.oregon.gov
    pattern www.summitfoods.com
    pattern www.marine-atlantic.ca
    pattern www.larway.com
    pattern www.rtlmotor.ca
    pattern *.abc.com
    pattern *.kijiji.ca
    pattern *.linkedin.com
    pattern *.skype.com
    pattern toronto.bluejays.mlb.com
    pattern *.gstatic.com
    parameter-map type urlf-glob cpaddbnwlocparadeny3
    pattern www.facebook.com
    pattern www.radiofreecolorado.net
    pattern facebook.com
    pattern worldofwarcraft.com
    pattern identityunknown.net
    pattern static.break.com
    pattern lyris01.media.com
    pattern www.saltofreight.com
    pattern reality-check.com
    pattern reality-check.ca
    parameter-map type ooo global
    tcp reassembly timeout 5
    tcp reassembly queue length 128
    tcp reassembly memory limit 8192
    parameter-map type trend-global global-param-map
    cache-size maximum-memory 5000
    crypto pki token default removal timeout 0
    crypto pki trustpoint Equifax_Secure_CA
    revocation-check none
    crypto pki trustpoint NetworkSolutions_CA
    revocation-check none
    crypto pki trustpoint trps1_server
    revocation-check none
    crypto pki trustpoint TP-self-signed-3538579429
    enrollment selfsigned
    subject-name cn=IOS-Self-Signed-Certificate-3538579429
    revocation-check none
    rsakeypair TP-self-signed-3538579429
    !! CERTIFICATE OMITED !!
    redundancy
    ip ssh version 2
    class-map type inspect match-any INCOMING_VPN_TRAFFIC_MAP
    match access-group name REMOTE_SITE_SUBNET
    class-map type inspect match-all PPTP_GRE_INSPECT_MAP
    match access-group name ALLOW_GRE
    class-map type inspect match-all INSPECT_SKINNY_MAP
    match protocol skinny
    class-map type inspect match-all INVALID_SOURCE_MAP
    match access-group name INVALID_SOURCE
    class-map type inspect match-all ALLOW_PING_MAP
    match protocol icmp
    class-map type urlfilter match-any cpaddbnwlocclasspermit2
    match  server-domain urlf-glob cpaddbnwlocparapermit2
    class-map type urlfilter match-any cpaddbnwlocclassdeny3
    match  server-domain urlf-glob cpaddbnwlocparadeny3
    class-map type urlfilter trend match-any cpcatdenyclass2
    class-map type inspect match-all cpinspectclass1
    match protocol http
    class-map type inspect match-any CUSTOMIZED_PROTOCOL_216
    match protocol citriximaclient
    match protocol ica
    match protocol http
    match protocol https
    class-map type inspect match-any INSPECT_SIP_MAP
    match protocol sip
    class-map type urlfilter trend match-any cptrendclasscatdeny1
    match  url category Abortion
    match  url category Activist-Groups
    match  url category Adult-Mature-Content
    match  url category Chat-Instant-Messaging
    match  url category Cult-Occult
    match  url category Cultural-Institutions
    match  url category Gambling
    match  url category Games
    match  url category Illegal-Drugs
    match  url category Illegal-Questionable
    match  url category Internet-Radio-and-TV
    match  url category Joke-Programs
    match  url category Military
    match  url category Nudity
    match  url category Pay-to-surf
    match  url category Peer-to-Peer
    match  url category Personals-Dating
    match  url category Pornography
    match  url category Proxy-Avoidance
    match  url category Sex-education
    match  url category Social-Networking
    match  url category Spam
    match  url category Tasteless
    match  url category Violence-hate-racism
    class-map type inspect match-any INSPECT_PROTOCOLS_MAP
    match protocol pptp
    match protocol dns
    match protocol ftp
    match protocol https
    match protocol imap
    match protocol pop3
    match protocol netshow
    match protocol shell
    match protocol realmedia
    match protocol rtsp
    match protocol smtp
    match protocol sql-net
    match protocol streamworks
    match protocol tftp
    match protocol vdolive
    match protocol tcp
    match protocol udp
    match protocol icmp
    class-map type urlfilter trend match-any cptrendclassrepdeny1
    match  url reputation ADWARE
    match  url reputation DIALER
    match  url reputation DISEASE-VECTOR
    match  url reputation HACKING
    match  url reputation PASSWORD-CRACKING-APPLICATIONS
    match  url reputation PHISHING
    match  url reputation POTENTIALLY-MALICIOUS-SOFTWARE
    match  url reputation SPYWARE
    match  url reputation VIRUS-ACCOMPLICE
    class-map type inspect match-all CUSTOMIZED_NAT_MAP_1
    match access-group name CUSTOMIZED_NAT_1
    match protocol user-port-1
    class-map type inspect match-all CUSTOMIZED_NAT_MAP_2
    match access-group name CUSTOMIZED_NAT_2
    match protocol user-port-2
    class-map type inspect match-any INSPECT_H323_MAP
    match protocol h323
    match protocol h323-nxg
    match protocol h323-annexe
    class-map type inspect match-all INSPECT_H225_MAP
    match protocol h225ras
    class-map type inspect match-all CUSTOMIZED_216_MAP
    match class-map CUSTOMIZED_PROTOCOL_216
    match access-group name CUSTOMIZED_NAT_216
    policy-map type inspect OUT-IN-INSPECT-POLICY
    class type inspect INCOMING_VPN_TRAFFIC_MAP
      inspect
    class type inspect PPTP_GRE_INSPECT_MAP
      pass
    class type inspect CUSTOMIZED_NAT_MAP_1
      inspect
    class type inspect CUSTOMIZED_NAT_MAP_2
      inspect
    class type inspect CUSTOMIZED_216_MAP
      inspect
    class class-default
      drop
    policy-map type inspect urlfilter cppolicymap-1
    description Default abc Policy Filter
    parameter type urlfpolicy trend cprepdenyregex0
    class type urlfilter cpaddbnwlocclasspermit2
      allow
    class type urlfilter cpaddbnwlocclassdeny3
      reset
      log
    class type urlfilter trend cptrendclasscatdeny1
      reset
      log
    class type urlfilter trend cptrendclassrepdeny1
      reset
      log
    policy-map type inspect IN-OUT-INSPECT-POLICY
    class type inspect cpinspectclass1
      inspect
      service-policy urlfilter cppolicymap-1
    class type inspect INSPECT_PROTOCOLS_MAP
      inspect
    class type inspect INVALID_SOURCE_MAP
      inspect
    class type inspect INSPECT_SIP_MAP
      inspect
    class type inspect ALLOW_PING_MAP
      inspect
    class type inspect INSPECT_SKINNY_MAP
      inspect
    class type inspect INSPECT_H225_MAP
      inspect
    class type inspect INSPECT_H323_MAP
      inspect
    class class-default
      drop
    zone security inside
    description INTERNAL_NETWORK
    zone security outside
    description PUBLIC_NETWORK
    zone-pair security INSIDE_2_OUTSIDE source inside destination outside
    service-policy type inspect IN-OUT-INSPECT-POLICY
    zone-pair security OUTSIDE_2_INSIDE source outside destination inside
    service-policy type inspect OUT-IN-INSPECT-POLICY
    crypto isakmp policy 10
    encr 3des
    authentication pre-share
    group 2
    crypto isakmp key password address 11.22.3.1
    crypto ipsec security-association lifetime seconds 28800
    crypto ipsec transform-set TunnelToCold esp-3des
    crypto map TunnelsToRemoteSites 10 ipsec-isakmp
    set peer 11.22.3.1
    set transform-set TunnelToCold
    match address TUNNEL_TRAFFIC2Cold
    interface Embedded-Service-Engine0/0
    no ip address
    shutdown
    interface GigabitEthernet0/0
    description OUTSIDE_INTERFACE
    ip address 1.1.1.186 255.255.255.248
    ip nat outside
    ip virtual-reassembly in
    zone-member security outside
    duplex full
    speed 1000
    crypto map TunnelsToRemoteSites
    crypto ipsec df-bit clear
    interface GigabitEthernet0/1
    description INSIDE_INTERFACE
    ip address 192.168.1.150 255.255.255.0
    ip nat inside
    ip virtual-reassembly in
    zone-member security inside
    duplex full
    speed 1000
    ip forward-protocol nd
    ip http server
    ip http access-class 10
    ip http authentication local
    ip http secure-server
    ip nat inside source static tcp 192.168.1.217 5080 interface GigabitEthernet0/0 5080
    ip nat inside source route-map NAT_MAP interface GigabitEthernet0/0 overload
    ip nat inside source static tcp 192.168.1.216 80 1.1.1.187 80 extendable
    ip nat inside source static tcp 192.168.1.216 443 1.1.1.187 443 extendable
    ip nat inside source static tcp 192.168.1.216 1494 1.1.1.187 1494 extendable
    ip nat inside source static tcp 192.168.1.216 2598 1.1.1.187 2598 extendable
    ip nat inside source static tcp 192.168.1.213 3389 1.1.1.187 3390 extendable
    ip nat inside source static tcp 192.168.1.216 5080 1.1.1.187 5080 extendable
    ip route 0.0.0.0 0.0.0.0 1.1.1.185
    ip access-list standard LINE_ACCESS_CONTROL
    permit 192.168.1.0 0.0.0.255
    ip access-list extended ALLOW_ESP_AH
    permit esp any any
    permit ahp any any
    ip access-list extended ALLOW_GRE
    permit gre any any
    ip access-list extended CUSTOMIZED_NAT_1
    permit ip any host 192.168.1.217
    permit ip any host 192.168.1.216
    ip access-list extended CUSTOMIZED_NAT_2
    permit ip any host 192.168.1.216
    permit ip any host 192.168.1.212
    permit ip any host 192.168.1.213
    ip access-list extended CUSTOMIZED_NAT_216
    permit ip any host 192.168.1.216
    ip access-list extended INVALID_SOURCE
    permit ip host 255.255.255.255 any
    permit ip 127.0.0.0 0.255.255.255 any
    ip access-list extended NAT_RULES
    deny   ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255
    deny   ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255
    deny   ip 192.168.1.0 0.0.0.255 192.168.4.0 0.0.0.255
    deny   ip 192.168.1.0 0.0.0.255 192.168.5.0 0.0.0.255
    deny   ip 192.168.1.0 0.0.0.255 192.168.6.0 0.0.0.255
    deny   ip 192.168.1.0 0.0.0.255 192.168.7.0 0.0.0.255
    deny   ip 192.168.1.0 0.0.0.255 192.168.8.0 0.0.0.255
    deny   ip 192.168.1.0 0.0.0.255 192.168.9.0 0.0.0.255
    deny   ip 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255
    permit ip 192.168.1.0 0.0.0.255 any
    ip access-list extended REMOTE_SITE_SUBNET
    permit ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255
    permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255
    permit ip 192.168.4.0 0.0.0.255 192.168.1.0 0.0.0.255
    permit ip 192.168.5.0 0.0.0.255 192.168.1.0 0.0.0.255
    permit ip 192.168.6.0 0.0.0.255 192.168.1.0 0.0.0.255
    permit ip 192.168.7.0 0.0.0.255 192.168.1.0 0.0.0.255
    permit ip 192.168.8.0 0.0.0.255 192.168.1.0 0.0.0.255
    permit ip 192.168.9.0 0.0.0.255 192.168.1.0 0.0.0.255
    permit ip 192.168.10.0 0.0.0.255 192.168.1.0 0.0.0.255
    ip access-list extended TUNNEL_TRAFFIC2ABM
    permit ip 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255
    ip access-list extended TUNNEL_TRAFFIC2Bridgewater
    permit ip 192.168.1.0 0.0.0.255 192.168.8.0 0.0.0.255
    ip access-list extended TUNNEL_TRAFFIC2ColdbrookDispatch
    permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255
    ip access-list extended TUNNEL_TRAFFIC2ColdbrookETL
    permit ip 192.168.1.0 0.0.0.255 192.168.7.0 0.0.0.255
    ip access-list extended TUNNEL_TRAFFIC2ColdbrookTrailershop
    permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255
    ip access-list extended TUNNEL_TRAFFIC2Moncton
    permit ip 192.168.1.0 0.0.0.255 192.168.6.0 0.0.0.255
    ip access-list extended TUNNEL_TRAFFIC2MountPearl
    permit ip 192.168.1.0 0.0.0.255 192.168.4.0 0.0.0.255
    ip access-list extended TUNNEL_TRAFFIC2Ontoria
    permit ip 192.168.1.0 0.0.0.255 192.168.5.0 0.0.0.255
    ip access-list extended WEB_TRAFFIC
    permit tcp 192.168.1.0 0.0.0.255 any eq www
    access-list 10 permit 192.168.1.0 0.0.0.255
    route-map NAT_MAP permit 10
    match ip address NAT_RULES
    snmp-server community 1publicl RO
    control-plane
    line con 0
    logging synchronous
    login authentication NONE_LOGIN
    line aux 0
    line 2
    no activation-character
    no exec
    transport preferred none
    transport input all
    transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
    stopbits 1
    line vty 0 4
    access-class LINE_ACCESS_CONTROL in
    exec-timeout 30 0
    logging synchronous
    transport input all
    scheduler allocate 20000 1000
    ntp server 0.ca.pool.ntp.org prefer
    ntp server 1.ca.pool.ntp.org
    end

    Hi,
    I know this is for a different platform but have a look at this link:
    https://supportforums.cisco.com/thread/2089462
    Read through it to get some idea of the similarity, but in particular note the last entry almost a year after the original post.
    I too am having trouble with http inspection, if I do layers 3 & 4 inspection there is no issue whatsoever, but as soon as I enable layer 7 inspection then I have intermittent browsing issues.
    The easy solution here is to leave it at layers 3 & 4, which doesn't give you the flixibility to do cool things like blocking websites, IM, regex expression matching etc...  but in my opinion I just don't think these routers can handle it.
    It appears to be a hit and miss affair, and going on the last post from the above link, you might be better off in having the unit replaced under warranty.
    The alternative is wasting a lot of time and effort and impacting your users to get something up and running that in the end is so flaky that you have no confidence in the solution and you are then in a situation where ALL future issues users are facing MIGHT be because of this layer 7 inspection bug/hardware issue etc?
    I would recommend you use the router as a frontline firewall with inbound/outbound acl's (no inspection), and then invest a few $ in getting an ASA dedicated firewall (but that's just me )

  • Iphone 6 shows SEARCH IPHONE instead of SPOTLIGHT SEARCH when swipe down the middle of screen. really worried...i'm on ios 8.1 ???please help

    when i swipe down my home screen on iPhone 6 it says ''SEARCH iPhone'' instead it should say ''Spotlight Search'' don't know what's the issue. i'm on iOS 8.1 but this problem was there when i was on stock 8.0

    According to my device, if you have Spotlight Suggestions and Bing Web Results turned on in Settings>General>Spotlight Search, it will show "Spotlight Search". If you have them turned off, it will show "Search iPhone".
    If you have those two options turned on, try toggling them off and then back on again and see if that clears it up. If it doesn't, try resetting your device (nothing will be lost): Hold down the Home and Power buttons at the same time and continue to hold them down until the Apple appears. Once the Slide to Unlock screen displays, go to your Home screen and try the Spotlight search again.
    Cheers,
    GB

  • Are some apps just not compatible with iTunes 10.5/iOS 5.0?

    Seems some apps on my iPod, conflict with iTunes 10.5.
    I started having the Store issue, which ALWAYS showed and worked, never had trouble accessing, never got a blank page... that started happening.
    (I think live search when typing is a bad idea)
    I had added back a few, by download and via iTunes, but next time I connected iPod, there was problem with iPod showing as a device, and with iTunes Store.
    Removed the 4 apps I had added/reinstalled, and now back to normal.
    Skype, RockMelt, iCab Mobile, Reeder, Transphotos
    I don't know if it was the combination or if it was Skype or photo retouch/editing or one of the others.
    I use to have 4.1GB "Other" also and that is now a more comfortable 1.1GB of space.
    NY Times "newstand" would not work on 4.3.5, or would but could not by synched, could not be moved to another iPod screen. So basically broken and may have led to other problems. These apps that work with iOS 5 but are not backward compatible, or the reverse situation, they aren't really 5.0 compatible.
    For me, I have to wait for Windows and iTunes to settle down, then connect iPod only. And when the iPod device would "vanish". Now where are the "dot one" patched bug-fix verfsions?
    And for those still on 4.3.5 and earlier, where is the means to keep and not update to a new version believing it will be backward compatible (and maybe the specs said "iOS 4+" when it should say it reqquires "Newstand and iOS 5+".

    Mounting a device in iTunes 10.5 with some incompatible apps will cause the device to unmount (disappear) from iTunes. Remove the offending app from the device before you next connect to iTunes and should now mount and stay mounted. Restart AMS if needed.
    New app that I put on iPhone will cause this. iPhone no longer shows in iTunes: Devices.
    click on "Devices" in iTunes
    drop down list of categories
    Suggest for features:
    Keep prior version in iTunes backup library
    Version, when installed or updated
    When in Apps, have option to go to product page directly. Easier and more likely to provide feedback.
    When in iTunes Store and in Apps, search would by default look first and foremost in App Store section.
    iTunes Store Category: iOS 5 Apps.
    Some are iOS 5 only and not backward compatible.
    Those should not be offered.
    Some say that they are iOS 4.x and later but are no longer.
    NYTimes now requires Newstand and 5.0 (I wrote and don't think they tested or were aware it wasn't backward or would not synch under iTunes 10.5). Was the prime reason I even upgraded to iOS 5, too! ouch.  iTunes 10.5 as tested vs as it actually is - differed and has significant impact. So give developers more access & time to test and certify against 10.5 before offering iOS 5. Why the rush instead of have a smoother rollout? it gets old afterawhile and looks rushed.
    For now, be careful.  It is hard to know what is compatible, and what to avoid even now, or especially now with the updates from Friday 28th.
    Uninstalling an app may be one way to "troubleshoot" but that also removes settings, and requires more work to authorize, customize, and setup again.
    Where is chkdsk for iOS?
    Last, does an app crashing or freezing corrupt the settings? the app itself? memory? leave behind "other" storage addresses that can't be used until fixed by remvoing and restoring not just app, but everything?

Maybe you are looking for

  • Google search keeps doing a custom search using "Özel Arama"... HOW do i return it to default search???

    When I click in the search area and choose a google search (taskbar), it returns with a bogus "Özel Arama" The url is: http://www.google.com/cse?cx=partner-pub-9588033570232632:rhmyra-cwbb&q=%22%C3%96zel+Arama%22+%22is+pissing+me+off%22&ie=utf-8&oe=u

  • Controlling from internal order

    can anybody help about internal order and how costing will be done based on that internal order.we are a construction company.we want to issue the materials based on internal order. At the end of the project, we want to come to know about the issues

  • MobileMe - A great tool. Now...Its stopping. Could someone give me an overview of iCloud

    Hi, Recently I was browsing through the apple pages when i found this. What's happening to MobileMe? The core services provided by MobileMe have been rewritten to work seamlessly with iCloud. MobileMe will no longer be available as a paid sync servic

  • Oracle VM - scsi problem

    Hello, We have just installed Oracle VM from the 2.1.1 iso image and the install went fine but now when we try to ftp files to the server we get serious I/O errors starting with "SCSI offset overrun detected resetting bus". After this we get a bunch

  • End user Quarantine Access

    I have configured our LDAP and turned on the quarantine access for users. I have tested and it works! Yeah..... well for people on the same subnet as he C300. The C300 is on a 10.x.x.x subnet and so is everyone at this location but those that are on